INVESTIGATING
COMPUTER FORENSICS
HIGH TECH INVESTIGATIONS
DIGITAL FORENSICS

In the News

On the horizon: Tech trends impacting law enforcement investigations
DIG4EVIDENCE
https://www.policeone.com/police-products/investigation/computer-digital-forensics/articles/471631006-On-the-horizon-Tech-trends-impacting-law-enforcement-investigations/

https://www.infosecurity-magazine.com/opinions/crack-cyber-attack-cases/

Crack Cyber Attack Cases ...with Terror Attack Investigation Tactics
White Vs. White
It is a given that investigators, spouses and counsel cannot access someone’s email account without due process. But once the email has been delivered to an email container on a shared or community property computer, (i.e. a computer that both spouses share), a New Jersey domestic decision allows that it is now fair game for examination by others with reasonable access to the computer.
Griffin v. State
Social media profiles on MySpace or Facebook could be authenticated circumstantially by their content and context in the same manner as other forms of electronic communications.
FENJE v. FELD
The authentication of email messages presented in support of a summary judgement motion was at the core of this wrongful termination case. The court found that email messages may be authenticated as being from the suspected author based on the following factors:
The email address from which it was sent
An affidavit of the recipient.....

Case Law

http://www.courts.state.md.us/opinions/coa/2011/74a10.pdf
http://caselaw.findlaw.com/nj-superior-court/1254960.html
http://caselaw.findlaw.com/us-7th-circuit/1176395.html